who never goes out ... except by choice or "accident" applications, I mean (hehe). Well, I'll go to the point, not before, as usual prevent: SHORT POINT FOR IMPORTANT QUESTION AND ITS ANSWER:
Question .- I can screw up stuff in it? Answer .- Yes
And that what was said, went on to propose a simple exercise for the more adventurous newcomers get in danger the health of your computer ... Open
HKEY_CURRENT_USER \\ Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ Explorer
The fun begins when, under it, you create a value called NoClose
type DWORD (REG_DWORD) , which will give value 1 if you want to disable the Shut Down command
, or 0 (zero) if you re-enable it. Yes, you read that right: these values \u200b\u200bare used to enable or disableoption System Shutdown.
Of course, the fun increases when, instead of the previous key, use this:
HKEY_LOCAL_MACHINE \\ Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ Explorer With the first we are preventing the user that we have entered into the system to switch off, but the latter is what we prevent all the users. But what is the reason for the existence of this variable in the always surprising and largely unknown
Windows registry? There are several theories.
data
A first theory originated in the days when John F. Hopkins, an employee of the company, every day off your computer and ran, as led by the devil himself, to arrive in time to take the bus that took him to the small village where he lived, about 50 miles from their workplace. Colleagues "Developers Team" decided that it might be funny, when leaving, John had some unforeseen difficulties which delayed. We've all seen the Internet video in which John, in his cubicle, smash the computer to see despair, one day more, that the option to Shut Down has "disappeared." So many were the laughs that what they were made, their charm and wit that variable companions decided to stay there forever.
Another theory suggests that it was the President himself U.S. who suggested that it would be interesting to introduce this type of difficulty in operating systems. Was achieved in this way, the interns often borrowed his superiors for help, encouraging beneficial as vertical communication in organizations. And
where employer does not send sailor was said and done.
But the more popular theory is based on conjecture
Nobitch-Hellman , that there computer (at least one) whose mental age is bounded below by the so-called teen-age (also called the awkward age or, more recently, the chicken)
. To prove this theory, an immediate corollary would be that there are certain elementscomputer databases or applications with serious and
morally and intellectually acceptable. Aligning with this line of argument, some suggest the following example. There
environments where it is undesirable that the machine can be turned off by any user, such as those in which you are running security software or control that should be permanently active. Sea, for example, the case of a digital recorder
. A digital recorder is, in essence (
), a collecting images programilla a camera (security) and saves. It is clear that if the computer we have one of these, do NOT agree that any user can shut us, because if we stop him we were no cameras, and this is NOT good.
Of course, if we want to prevent any user
we can turn off the computer , the first thing we should try to do is restrict access to the off switch, power cable, motherboard and all that nonsense with which so easily can make the ordenata then poof! That is, in our example let the ranger's hut (security office fine sites) monitor, keyboard and mouse as much. The rest will be on the other side of any wall in any room of greater security and more restricted access.
But is that enough? Well of course not: we have not blocked access to the registry, or the command line, or ... Anyway, if you like games of attacker and defender, here's a pretty cool. When you think you have everything well tied down (if you do as a defender), you only miss a good attacker. If you want to save the Styes that would cost you a fee, you very well apañártelas Aragonese looking for a network, the habemos in abundance. Choose a computer to know: what will distinguish the Cachirulo black with the skull (optional) and because the keys pressed loose. Put it in front of your computer and espétale good stiff, hands on her hips: Á-WHY-no-Ma-Pa-GAS-e-Lor-DE-NA-DOR!
(As is well known, the hands always accentuate the syllables, but especially when we challenge something.)Do you like ... computing?
Do you like ... compete?
Luck to the hand, then!